Theory of Cryptography
From MaRDI portal
Publication:5711659
DOI10.1007/b106171zbMath1079.94543OpenAlexW4251449056WikidataQ59379672 ScholiaQ59379672MaRDI QIDQ5711659
Anupam Datta, Ajith Ramanathan, Ralf Küsters, John C. Mitchell
Publication date: 7 December 2005
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b106171
Related Items
Polynomial runtime and composability, Adaptive security of multi-party protocols, revisited, The IITM model: a simple and expressive model for universal composability, Joint state composition theorems for public-key encryption and digital signature functionalities with local computation, The reactive simulatability (RSIM) framework for asynchronous systems, Task-structured probabilistic I/O automata, On the relationships between notions of simulation-based security, Conditional Reactive Simulatability, Soundness of Formal Encryption in the Presence of Key-Cycles